|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn317877904 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090406s2010 njua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d CTN
|d SHH
|d IDEBK
|d OCLCQ
|d MERUC
|d DEBSZ
|d OCLCQ
|d OCLCF
|d CDX
|d OCLCQ
|d YDX
|d OCLCA
|d OCLCQ
|d WYU
|d VT2
|d INARC
|d UKAHL
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBA951486
|2 bnb
|
016 |
7 |
|
|a 015265484
|2 Uk
|
019 |
|
|
|a 505430281
|a 559038533
|a 667059008
|a 1064148716
|a 1103264159
|a 1176442593
|a 1202549999
|a 1240510467
|
020 |
|
|
|a 9780321591890
|
020 |
|
|
|a 0321591895
|
020 |
|
|
|a 9780321591807
|q (pbk. ;
|q alk. paper)
|
020 |
|
|
|a 0321591801
|q (pbk. ;
|q alk. paper)
|
024 |
8 |
|
|a 9786612432262
|
029 |
1 |
|
|a CDX
|b 11910189
|
029 |
1 |
|
|a CHBIS
|b 006149969
|
029 |
1 |
|
|a CHVBK
|b 17125340X
|
029 |
1 |
|
|a DEBSZ
|b 355406977
|
035 |
|
|
|a (OCoLC)317877904
|z (OCoLC)505430281
|z (OCoLC)559038533
|z (OCoLC)667059008
|z (OCoLC)1064148716
|z (OCoLC)1103264159
|z (OCoLC)1176442593
|z (OCoLC)1202549999
|z (OCoLC)1240510467
|
037 |
|
|
|a CL0500000037
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b T76 2010eb
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Trost, Ryan.
|
245 |
1 |
0 |
|a Practical intrusion analysis :
|b prevention and detection for the twenty-first century /
|c by Ryan Trost.
|
260 |
|
|
|a Upper Saddle River, N.J. :
|b Addison-Wesley,
|c 2010.
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Network overview -- Infrastructure monitoring -- Intrusion detection systems -- Lifecycle of a vulnerability -- Proactive intrusion prevention and response via attack graphs -- Network flows and anomaly detection -- Web application firewalls -- Wireless IDS/IPS -- Physical intrusion detection for IT -- Geospatial intrusion detection -- Visual data communications -- Return on investment : business justification.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Monitoring.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Surveillance.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
7 |
|a Computer networks
|x Monitoring.
|2 fast
|0 (OCoLC)fst01765706
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Computers
|x Access control.
|2 fast
|0 (OCoLC)fst00872779
|
776 |
0 |
8 |
|t Practical intrusion analysis : prevention and detection for the twenty-first century.
|d Upper Saddle River, N.J. : Addison-Wesley, 2010
|z 9780321591807
|z 0321591801
|w (OCoLC)318420991
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780321591890/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37826635
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37828674
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 11910189
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 243226
|
938 |
|
|
|a Internet Archive
|b INAR
|n practicalintrusi0000tros
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14858657
|
994 |
|
|
|a 92
|b IZTAP
|